How Next Generation Trusted Identities Can Help Transform Your Business

Similar documents
ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION

TRANSFORMING THE BANKING EXPERIENCE WITH TRUSTED IDENTITIES entrust.com

Mobile Devices prioritize User Experience

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Next Generation Authentication

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Identity Management as a Service

white paper SMS Authentication: 10 Things to Know Before You Buy

Authentication Technology for a Smart eid Infrastructure.

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Are You Flirting with Risk?

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Session 2: Understanding the payment ecosystem and the issues Visa Europe

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Mobile: Purely a Powerful Platform; Or Panacea?

Are You Flirting with Risk?

Keep the Door Open for Users and Closed to Hackers

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android)

Make security part of your client systems refresh

Building the Business Case for Strong Authentication

Single Secure Credential to Access Facilities and IT Resources

Enabling Compliance for Physical and Cyber Security in Mobile Devices

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Securing Today s Mobile Workforce

Is Your Online Bank Really Secure?

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

Universal Representation of a Consumer's Identity Is it Possible? Presenter: Rob Harris, VP of Product Strategy, FIS

LOGIN. Cloud-Based Authentication BUYER'S GUIDE. Helping you Navigate the Possibilities

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

BlackBerry 2FA. Datasheet. BlackBerry 2FA

PKI is Alive and Well: The Symantec Managed PKI Service

Solution. Imagine... a New World of Authentication.

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

Strong Authentication for Physical Access using Mobile Devices

Mobile Security using IBM Endpoint Manager Mobile Device Management

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

Dissecting NIST Digital Identity Guidelines

ASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003

Digital Identity Trends in Banking

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Identity & security CLOUDCARD+ When security meets convenience

Five Reasons It s Time For Secure Single Sign-On

Virtual Machine Encryption Security & Compliance in the Cloud

Secure Lightweight Activation and Lifecycle Management

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

Safelayer's Adaptive Authentication: Increased security through context information

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

Yubico with Centrify for Mac - Deployment Guide

HIPAA Compliance discussion

FFIEC Guidance: Mobile Financial Services

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Authentication and Fraud Detection Buyer s Guide

DigitalPersona for Healthcare Organizations

AS emas emudhra Authentication Solution

Security Solutions for Mobile Users in the Workplace

Security Enhancements

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

The Device Has Left the Building

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

NFC Identity and Access Control

Behavioral Biometrics. Improve Security and the Customer Experience

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

Using Smart Cards to Protect Against Advanced Persistent Threat

THE SECURITY LEADER S GUIDE TO SSO

THE FUTURE IS DECENTRALIZED

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Choosing the right two-factor authentication solution for healthcare

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

TRUST ELEVATION WITH SAFELAYER TRUSTEDX. David Ruana, Helena Pujol 14Q4

Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

Citrix XenMobile and Windows 10

THE RSA AUTHENTICATION DECISION TREE

Key Authentication Considerations for Your Mobile Strategy

VMware PIV-D Manager Deployment Guide

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Entrust DataCard Securing Digital Transactions and Identities

Secure Government Computing Initiatives & SecureZIP

Key Protection for Endpoint, Cloud and Data Center

Google Identity Services for work

Mobilize with Enterprise Security and a Productive User Experience

Authentication Methods

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Transcription:

SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust

Identity underpins our PERSONAL life 2

Identity underpins our WORK life 3

So, what s the problem? TOO MANY IDENTITIES, TOO MANY PASSWORDS 4

Mega-breaches target password weaknesses 5

Solving the core issue BUILDING A TRUSTED DIGITAL IDENTITY & EMPOWERING MOBILITY 6

Achieving Usability & Security 7

SO HOW DO WE MOVE TOWARDS TRUSTED IDENTITES? 8

9

Benefits of a Mobile-Based Trusted Identity Protect the business & our customers New Services / better processes Improve productivity & UX Reduce IT cost and complexity 10

Powerful Native Features Enhance Security Device & Location Attributes TEE & Secure Element Application Sandbox Biometrics Crypto Out of Band Channel 11

Transparent/Low friction security that adapts to risk SECURITY LAYERS RISK VECTORS Jail broken phones Lost/stolen phones Rogue applications Breached credentials Impersonating devices Banking trojans/malware CNP fraud OPERATING SYSTEM DEVICE CHANNEL USER TRANSACTION Jailbreak detection Sandboxing Malware detection Trusted execution environment (TEE) Device fingerprinting Geo-location Device ID Protected application access Mutual SSL authentication Adaptive authentication Embedded digital ID Push authentication Push transaction signing Transaction signing tokens 12

MOVING TOWARDS THE PASSWORD-LESS ENTERPRISE 13

Use Cases APPROVALS & SIGNING PHYSICAL ACCESS TRANSACTION VERIFICATION LOGICAL ACCESS FEDERATE TO SAAS VPN

VPN Authentication PROBLEM: SOLUTION: Hardware tokens are secure but not user friendly Mobile Push Authentication simplifies 2FA for users and IT IT provisioning and logistics is complex Expensive, limited use technology 15

Mobile Push for VPN authentication xxxxx xxxxx xxxxx No hardware tokens to carry Better user experience Easy user provisioning Certificate approach is password-less 16

Physical / logical access PROBLEM: SOLUTION: Passwords are painful to use and insecure Transform mobile devices into multipurpose virtual smart cards Smart cards are expensive and complex to deploy Building access cards are insecure 17

Windows SCLO Traditional Smart Card 18

Windows SCLO Traditional Smart Card Mobile Virtual Smart Card Virtual smart card reader Convenient auto-detect Secure auto-logout 19

Physical access NFC-based communication to PACs Convenient / always in hand Strong Authentication Can t be skimmed PKI certificate-based Biometrics PIV / Derived Credential compliant 20

On-the-go approvals PROBLEM: SOLUTION: Constant need to improve business process (employees and customers) Use mobile for anywhere, anytime digital signing Many processes require formal approvals / signatures Traditional digital signing is complex to deploy and have a poor UX 21

Digital Signature Using Mobile 1. Transaction origination Doctor writing a prescription Banker offering a loan Employee submitting a requisition Enable Business Transformation 2. Transaction approval Convenient / user friendly process Improve internal efficiency Improve consumer experience 22

Summary Identity is critical to today s connected enterprise Dated authentication methods fall short Security Usability Cost / IT management Mobile trusted identities transform business and the password-less enterprise More secure More convenient Truly multi-purpose 23

Apply what you have learned today Next week you should: Identify opportunities and use cases in your organization whereby trusted identities on mobile devices can be leveraged In the first three months following this presentation you should: Assess the critical qualities that would be used in the vendor qualification process Begin vendor selection Within size months you should: Select a vendor s solution and conduct a pilot with your first use case Plan the implementation for supporting all use cases 24

BACK UP 25

All industries are at risk EMPLOYEE IDENTITIES ARE BECOMING A WEAK LINK 26

Mitigating the risk of fraud USE CASE 3 PROBLEM: SOLUTION: Fraud attacks are increasing in scope and sophistication Use mobile to verify transactions out of band defeating account takeovers Customer data, enterprise systems, intellectual property & money are at risk Malware can ride on authenticated user sessions 27

Mitigating the risk of fraud USE CASE 3 Compromised with desktop Malware? Let s say you want to execute a $5000 bank transfer How can you be sure your PC is not infected with malware? 28

Mobile for Transaction Verification USE CASE 3 Compromised with desktop Malware? Transaction details retrieved over secure connection Offline Transaction Verification QR Code 29

Mobile will become the New Enterprise Desktop Not portable Secure location Work only Portable Less Secure Locations Work & some personal Highly portable Anywhere anytime access BYOD

Mobile as the New Desktop DIGITAL IDENTITY 31

Entrust Datacard Corporate Overview Trusted Identities Secure Transactions Privately held, headquartered in Minneapolis, MN, USA Founded in 1969 Approximately $650M in annual revenue 2,000+ employees 34 worldwide locations Sales, service and support covering 150+ countries 32

So what s the problem? Too many identities Too many passwords Too many password rules / changes Lost / forgotten cards / hardware tokens More regulatory laws around identities 33

Mobile- A unique blend of security and usability Users want to carry them Always in hand Always connected Convenient Support work / personal balance Smart phones are becoming ubiquitous Both enterprise and consumer segments Technology and security allows them to be used for multi-purpose trusted identities 34

Adaptive Authentication Platform FRICTIONLESS EXPERIENCE No passwords Identify with a simple swipe Familiar for smartphone users Highly secure ENABLING SOLUTION RELEASE 11 Adaptive authentication identifies risks Layered security device, identity & behavior analytics Support for Apple, Samsung & Windows devices Transaction signing for CNP transaction 35

Security for Every Vulnerability MOBILE SECURITY Phone Jailbreak or Root Detection App Access Control PIN, Biometrics Device Authentication Device Fingerprinting Adaptive Authentication External Risk Engines & Contextual Data User Authentication Transparent OTP or Certificate-Based Transaction Authentication Mobile Push Notifications Strong Identity Protection TEE Storage ONLINE SECURITY AUTHENTICATION USER DEVICE CHANNEL TRANSACTION APPLICATION 36

Stronger controls are not always better More complex passwords? Hardware tokens for the masses? USB security keys? Smart cards? Some offer better security but Costly Logistics to issues / replace User have to carry them User experience frustrating Not multi-purpose Can you issue them to customers and partners?